A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http:///a.php in a phishing email. To prevent other computers from being infected by the same malware variation, the analyst should create a rule on the:

A. email server that automatically deletes attached executables.
B. IDS to match the malware sample.
C. proxy to block all connections to
D. firewall to block connection attempts to dynamic DNS hosts.


Answer: C. proxy to block all connections to

Computer Science & Information Technology

You might also like to view...

What standarizes sounds and video format so plug-ins like Flash are no longer needed?

A. SMTP B. IMAP4 C. JavaScript D. HTML5

Computer Science & Information Technology

The ________ slide layout is used for bulleted lists or to insert objects such as a table or video

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following analyzes, develops, and supports the functionality of a website?

A. systems analyst B. database designer? C. systems programmer D. web developer?

Computer Science & Information Technology

If you forget the password of an encrypted document, the file can still be reopened.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology